First published: Wed Sep 03 2008(Updated: )
The SAML Single Sign-On (SSO) Service for Google Apps allows remote service providers to impersonate users at arbitrary service providers via vectors related to authentication responses that lack a request identifier and recipient field.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Google Google Apps |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-3891 has been classified as a medium severity vulnerability due to its potential for user impersonation.
CVE-2008-3891 allows remote service providers to impersonate Google Apps users, potentially compromising user accounts.
Exploitation of CVE-2008-3891 could lead to unauthorized access to sensitive user information across connected services.
To mitigate CVE-2008-3891, ensure that your SAML configurations validate request identifiers and recipient fields properly.
There is no specific patch for CVE-2008-3891; however, applying best security practices for SAML configurations can help mitigate the risk.